General

  • Target

    371a70e7977b9e28f1b6a23d687ad2dd93a027c16110439b1f25e8e532204223

  • Size

    121KB

  • MD5

    4733b89cf5f3d0e03a74d43900ae13a8

  • SHA1

    d3cd259fb4ff0997e70bb4c06444dc42ee067e81

  • SHA256

    371a70e7977b9e28f1b6a23d687ad2dd93a027c16110439b1f25e8e532204223

  • SHA512

    882a3499725eb03bfebf042b634b69becb0b428033010034baba4984d2fd63130ccccd9b27dd0344343dbf8c90e4779ab828307794c4a476354b59005ec63a35

  • SSDEEP

    3072:6Te85PbMvcPEhVjFWfh+Sn8ctzEYoHtJ6pubg+oVUaKhgdmr:6TeZvcPEhVjFWfZ1poHL4gg+oVUaKhgo

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 371a70e7977b9e28f1b6a23d687ad2dd93a027c16110439b1f25e8e532204223
    .elf linux x86